• Title/Summary/Keyword: Program Codes

Search Result 367, Processing Time 0.027 seconds

Cohort profile: National Investigation of Birth Cohort in Korea study 2008 (NICKs-2008)

  • Kim, Ju Hee;Lee, Jung Eun;Shim, So Min;Ha, Eun Kyo;Yon, Dong Keon;Kim, Ok Hyang;Baek, Ji Hyeon;Koh, Hyun Yong;Chae, Kyu Young;Lee, Seung Won;Han, Man Yong
    • Clinical and Experimental Pediatrics
    • /
    • v.64 no.9
    • /
    • pp.480-488
    • /
    • 2021
  • Background: An adequate large-scale pediatric cohort based on nationwide administrative data is lacking in Korea. Purpose: This study established the National Investigation of Birth Cohort in Korea study 2008 (NICKs-2008) based on data from a nationwide population-based health screening program and data on healthcare utilization for children. Methods: The NICKs-2008 study consisted of the Korean National Health Insurance System (NHIS) and the National Health Screening Program for Infants and Children (NHSPIC) databases comprising children born in 2008 (n=469,248) and 2009 (n=448,459) in the Republic of Korea. The NHIS database contains data on age, sex, residential area, income, healthcare utilization (International Classification of Diseases10 codes, procedure codes, and drug classification codes), and healthcare providers. The NHSPIC consists of 7 screening rounds. These screening sessions comprised physical examination, developmental screening (rounds 2-7), a general health questionnaire, and age-specific anticipatory guidance. Results: During the 10-year follow-up, 2,718 children (0.3%) died, including more boys than girls (hazard ratio, 1.145; P<0.001). A total of 848,048 children participated in at least 1 of the 7 rounds of the NHSPIC, while 96,046 participated in all 7 screening programs. A total of 823 infants (0.1%) weighed less than 1,000 g, 3,177 (0.4%) weighed 1,000-1,499 g, 37,166 (4.4%) weighed 1,500-2,499 g, 773,081 (91.4%) weighed 2,500-4,000 g, and 32,016 (5.1%) weighed over 4,000 g. There were 23,404 premature babies (5.5%) in 2008 compared to 23,368 (5.6%) in 2009. The developmental screening test indicated appropriate development in 95%-98% of children, follow-up requirements for 1%-4% of children, and recommendations for further evaluation for 1% of children. Conclusion: The NICKs-2008, which integrates data from the NHIS and NHSPIC databases, can be used to analyze disease onset prior to hospitalization based on information such as lifestyle, eating habits, and risk factors.

A Study on Validation of OFP for UAV using Auto Code Generation (자동 코드생성을 이용한 무인기용 OFP의 검증에 관한 연구)

  • Cho, Sang-Ook;Choi, Kee-Young
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.4
    • /
    • pp.359-366
    • /
    • 2009
  • MATLAB Autocode generation is a feature that converts a block diagram model in Simulink to a c program. Utilizing this function makes MATLAB/Simulink an integrated developing environment, from controller design to implementation. It can reduce development cost and time significantly. However, this automated process requires high reliability on the software, especially the original Simulink block diagram model. And thus, the verification of the codes becomes important. In this study, a UAV flight program which is generated with Simulink is validated and modified according to DO-178B. As a result of applying the procedures, the final program not only satisfied the functional requirement but is also verified with structural point of view with Decision Coverage 93%, Condition Coverage 95% and MC/DC 90%.

The Study on Improvement of the Program that Traces the Binary Codes in Execution (실행 중인 바이너리 코드 추출 프로그램의 기능 확장 연구)

  • Chang, Hang-Bae;Kwon, Hyuk-Jun;Kim, Yang-Hoon;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1309-1315
    • /
    • 2009
  • This research goal of developing and producing a tool that finds security weakness that may happen when a usual program is executed. The analyzing tool for security weakness has the major functions as follows. In case that a part of anticipated security weakness are in execution, it traces a machine language to a part in execution. And Monitoring System calls and DLL(API) calls when a program is in execution. The result of this study will enable to contribute to use as educational materials for security service in companies and related agencies and to prevent from hacking of external information invaders in the final analysis.

  • PDF

An Implementation of an SHA-3 Hash Function Validation Program and Hash Algorithm on 16bit-UICC (SHA-3 해시 함수 검정 프로그램과 16bit-UICC 용 SHA-3 구현)

  • Lee, Hee-Woong;Hong, Dowon;Kim, Hyun-Il;Seo, ChangHo;Park, Kishik
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.885-891
    • /
    • 2014
  • A hash function is an essential cryptographic algorithm primitive that is used to provide integrity to many applications such as message authentication codes and digital signatures. In this paper, we introduce a concept and test method for a Cryptographic Algorithm Validation Program (CAVP). Also, we design an SHA-3 CAVP program and implement an SHA-3 algorithm in 16bit-UICC. Finally, we compare the efficiency of SHA-3 with SHA-2 and evaluate the exellence of the SHA-3 algorithm.

Corrosion Assessment by Using Risk-Based Inspection Method for Petrochemical Plant - Practical Experience

  • Choi, Song-Chun;Song, Ki-Hun
    • Corrosion Science and Technology
    • /
    • v.8 no.3
    • /
    • pp.119-125
    • /
    • 2009
  • Corrosion assessment has a number of uses but the use considered here is as a precursor to Risk-Based Inspection (RBI) planning. Systematic methods consisting of technical modules of RBI program were used to assess the effect of specific corrosion mechanism on the probability of failure in equipments of petrochemical plants. Especially in part of the damage and corrosion assessment, screening step involved evaluating the combinations of process conditions and construction materials for each equipment item in order to determine which damage mechanisms are potentially active. For general internal corrosion, either API 510 or API 570 was applied as the damage rate in the calculation to determine the remaining life and inspection frequency. In some cases, a measured rate of corrosion may not be available. The technical modules of RBI program employ default values for corrosion, typically derived from published data or from experience with similar processes, for use until inspection results are available. This paper describes the case study of corrosion and damage assessment by using RBI methodology in petrochemical plant. Specifically, this paper reports the methodology and the results of its application to the petrochemical units using the $KGS-RBI^{TM}$ program, developed by the Korea Gas Safety Corporation to suit Korean situation in conformity with API 581 Codes.

Hybrid Web App Development for Eye movement at Mobile Devices (모바일 기기에서 눈 운동을 할 수 있는 하이브리드 웹앱 개발)

  • Seok, Hyun-Tack
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.249-254
    • /
    • 2013
  • This paper presented a mobile application program to help eye movement with mobile devices. It helps to strengthen ocular muscles and improve visual acuity. Users can easily access the program of eye movement type of app program in mobile devices. There were some papers which studied on the eye movement and showed efficient eye movement method for improvement of visual acuity. So here presents programming codes to help eye movement with some specific patterns from some papers and it was implemented by HTML, CSS and javascript. To convert web code to app code, appspresso tool was used.

OVERVIEW OF RECENT EFFORTS THROUGH ROSA/LSTF EXPERIMENTS

  • Nakamura, Hideo;Watanabe, Tadashi;Takeda, Takeshi;Maruyama, Yu;Suzuki, Mitsuhiro
    • Nuclear Engineering and Technology
    • /
    • v.41 no.6
    • /
    • pp.753-764
    • /
    • 2009
  • JAEA started the LSTF experiments in 1985 for the fourth stage of the ROSA Program (ROSA-IV) for the LWR thermal-hydraulic safety research to identify and investigate the thermal-hydraulic phenomena and to confirm the effectiveness of ECCS during small-break LOCAs and operational transients. The LSTF experiments are underway for the ROSA-V Program and the OECD/NEA ROSA Project that intends to resolve issues in thermal-hydraulic analyses relevant to LWR safety. Six types of the LSTF experiments have been done for both the system integral and separate-effect experiments among international members from 14 countries. Results of four experiments for the ROSA Project are briefly presented with analysis by a best-estimate (BE) code and a computational fluid dynamics (CFD) code to illustrate the capability of the LSTF and codes to simulate the thermal-hydraulic phenomena that may appear during SBLOCAs and transients. The thermal-hydraulic phenomena dealt with are coolant mixing and temperature stratification, water hammer up to high system pressure, natural circulation under high core power condition, and non-condensable gas effect during asymmetric SG depressurization as an AM action.

Modeling cryptographic algorithms validation and developing block ciphers with electronic code book for a control system at nuclear power plants

  • JunYoung Son;Taewoo Tak;Hahm Inhye
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.25-36
    • /
    • 2023
  • Nuclear power plants have recognized the importance of nuclear cybersecurity. Based on regulatory guidelines and security-related standards issued by regulatory agencies around the world including IAEA, NRC, and KINAC, nuclear operating organizations and related systems manufacturing organizations, design companies, and regulatory agencies are considering methods to prepare for nuclear cybersecurity. Cryptographic algorithms have to be developed and applied in order to meet nuclear cybersecurity requirements. This paper presents methodologies for validating cryptographic algorithms that should be continuously applied at the critical control system of I&C in NPPs. Through the proposed schemes, validation programs are developed in the PLC, which is a critical system of a NPP's I&C, and the validation program is verified through simulation results. Since the development of a cryptographic algorithm validation program for critical digital systems of NPPs has not been carried out, the methodologies proposed in this paper could provide guidelines for Cryptographic Module Validation Modeling for Control Systems in NPPs. In particular, among several CMVP, specific testing techniques for ECB mode-based block ciphers are introduced with program codes and validation models.

Design and Implementation of Visual Environment for Parallel Object-Oriented Programming (병렬 객체지향 프로그래밍을 위한 시각 환경의 설계 및 구현)

  • Choe, Suk-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.485-496
    • /
    • 1999
  • Comparing with sequential programming, parallel programming has additional complexity due to the consideration of parallelism, communication and synchronization of processes. A synergism between users and compliers should be established, each assisting the other to produce high quality parallel programs. On the above underlying philosophy, we developed a parallel Object-Oriented specification language, POOSL, as preliminary works. However, it is still likely to hard for users to write parallel program because users have to consider grammar of POOSL and to write text-based parallel program. It would be more desirable to provide users wit visual environment for effective parallel programming. Therefore, we propose a visual programming environment. VEPO(Visual environment for Parallel Object-Oriented Programming), based on POOSL in order that users can develop parallel programs more easily and conveniently. It aims at supporting a programming environment in which users can represent their programs more naturally and visually I parallel manner with object-oriented concept and essential steps during parallel program development such as program specification, compilation, execution and animation of execution are integrated. VEPO has useful features for parallel processing. Especially, complicated parallel codes for synchronization and communication of processes are automatically generated in the translation phase, so users can be relieved of writing error-prone parallel codes. The system is targeted to the transputer-based parallel system, MC-3. The graphic user interface of VEPO was implemented using Visual C++. Visual programs descirbed on VEPO are translated into Inmos C and executed on MC-3.

  • PDF

A Study on Partial Scoring in Text Based Program Evaluation (텍스트 기반 프로그램 평가에서 부분점수 구성에 관한 고찰)

  • Lee, JaeYoung;Kim, JaMee;Lee, WonGyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.22 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • The evaluation of programs related to SW development often only provides the right answer of the student's program. The purpose of this study was to provide the baseline data about the contents of the program evaluation support the teacher's class and which part should be considered important in partial scoring. To accomplish the goal, we had two months of Python lessons for 90 middle school students in free-semester and analyzed 1185 source codes collected during the lessons. Result of analysis, many students made mistakes about syntax errors and teachers considered logic errors as important. Based on the result, it is necessary to reduce the student's syntax errors and teachers need to evaluate student's program with considering the importance of logical aspects and necessary to devise a partial scoring. This study has significance about consideration of program evaluation from the perspective of learning support and evaluation.